Skip to main content

tv   [untitled]    October 6, 2012 11:30am-12:00pm EDT

11:30 am
they travel hundreds of kilometers in winter when men and children fall then. the two families have less of a chance to come across each other they belong to different schools even though there's sometimes a similar. hello yet a while from to spotlight the interview still try to find algorithm and today my guest on the program is. it less than a decade the world fest turned on to social media generally things so personal security in real life people go virtually and they get on the net profit sharing too much information that. you have held gadgets allegedly alleged and tried slip
11:31 am
music day so is it evil the dark side of technological problems or if there is a way that we can protect us will discuss it with or without computer security expert the co-founder of us first time the after suspect. the record development of personal mobile devices has encouraged speculation about the rise of all well you and big brother the co-founder of the internet security company kaspersky lab. supports the notion just says all mobile devices can spy on their owners in particular world's best seller the i phone you can even feel misusers and sand to a third party natalia believed spy features would threaten not only personal privacy but the security of entire countries. oh tell you who welcome to the show thank you thank you very much for being with us
11:32 am
and the well i should the reason i wanted to interview on this show is that you are known recently for a couple of years rather for being very much alarmed by by the spread of the gadget which allegedly collect personal data and share it with others especially the the the newest news gauges like the i phone plans and sounds of also so here's a true and what kind of data are we talking about. first say. that i am not about the facts. that providers or. producers of the gadget should share this information with somebody else. the fact is that they do collect some of data for example give a cation. by fire information about. again
11:33 am
locations of the person some of the personal information. identifications of course for the purpose of identify the user in such a network like a pool store or something. and. as far as i concern and i need to say that they do not personally. those devices the watch out there working i'm just reading mostly for sources of the computer security. and they say that the. all different forms not on the airport but all different like and draw it. all provide information back to their producers about. about personalities is it legal to collect this sort of information look good because otherwise how do they
11:34 am
protect themselves from lawsuits have you ever read the user agreement by sense agreement if you or your buddies if not now whether that's that's a problem because if you do if you would see in the agreement they will collect some of the information. and when you buy your device and you activate the device you automatically agree with dos license agreement which has this clause so basically you give your agreement for using your personal information otherwise device wouldn't work so. one other thing i wanted to to clarify you mentioned some some information that they do collect when you mention apple store and we did thought about who can detail is do they do that in the. details if you play in the eps. so they they do the the pinko the everything you. call not certain about being caught because you usually don't not provide and you
11:35 am
provide the credit card information you give the number. you need a. security short security number but not been caught so they they do have the details so theoretically they can use the data too to buy something in my name is not right. well it's very much theoretically it is that this happens you of course will not us that some somebody withdraw money from you you know how and so then what so what's so worrying about it i mean do i have i think i think that i do not have anything to hide well from others i mean well what i do have to hide i don't put it under that and. so no i don't i mean i mean i do put my personal pictures in than that and who was a two person but i still do have to worry about anything do i have to worry about somebody obtain my card details my mind for example i don't know my medical records
11:36 am
or whatever well ok sure well so ridiculous speaking again where we're speaking to ridiculous. somebody if somebody has so much information about yourself. he or she or a company if it's a company and in this case it is a company might use that information for some other purpose and they have a big. maybe desire or chance to use your information so that's not that that their presents increased by itself. why they collect this information for what they do with it or use it somehow sure they use it mostly for providing you with different type of services spam. not necessarily spam. you know on there's a special market for services which is growing here here i disapprove diktat that
11:37 am
will hit eight billion dollars there was time i learned lose been poor shoes on my cellphone when i switched to go live to one of the plane so welcome to munich. i was there about like. you know when i traveled to europe and there was more going of course when they flew in and germany it was german in its welcome in germany and then they ceased their border on my car and immediately welcomed me in fizzling so if you know that moments was the last years and so you know i was returnable every time for example if i if i get. from my so phone and cruiser book called my travelling agent you know the next day i start getting. biased towards this work towards australia. is that what you mean. not guilty
11:38 am
services is something when you are for example walking down the street and see coffee on the right side or your mobile device says here there is a cafe on the right so you might know you is larry the lemur elitism you know yes exactly oh look. you said that theoretically that information is available to to the providers can be can be somehow used to we may be used against me but were there cases when that really happened if somebody was for it can you tell us about. not but i would first tell about a case when there's a permission when top. of group just recently very recently a listen a month ago or the beginning of fears this of september six of them or something. groups and to sec has announced that they managed to get twenty million.
11:39 am
and the difficult missions doing to an end user i.d.'s from i phone users. from that which we received from the laptop of a b i. of course a very thick line they had any leakage of information it also declined to prove the case this hacker group put one million records up on the internet. they really did it so that's their pills very. dangerous usage so bill imagine you with. so i just don't get it so so these are these million dollar they're going to there's a records there's a records about users in the records they're all saw get the location of the user maybe not the current location but at least allegation where you have been for a month or so it would mean really everybody knows where i am in the news we you i
11:40 am
mean it's a little problem when mommy mommy people well when i decided to interview you i called my producer so we're going to. give me five minutes she picks up and for a minute she knows where you are so i mean you don't have to be accurate well yes but if you looking for somebody for a government agent for example or. your son which. has a big governmental or commercial secrets then that would be a different story but ok now we see that buying just commercial life that may be potentially dangerous for you like. whenever you know. that was to keep secrets but can his security security from that can there be you know i will mobile device and be safe if i want to keep my privacy is it possible to overcome this identification thing quite difficult difficult. i difficult because
11:41 am
you might for example. you know you might for him but you're sort of. i phone your guild occasionally but as a matter of fact. some of the experts told that despite. does agree to open your kitchen the phone still will send this information back to the producer so. there as a problem is that for example. is conducted so that you cannot add any additional extra software on top of that the russian lead you want a. phone bill for the bricks. they are more dangerous because they can kill viruses for a whole year so it is it's another story when the open there you open it for everyone and we only write. completely dependant on the providers if
11:42 am
they want to get information about you they will and your security service can help you. so this is you never to believe a lie as we as we said maybe get a security service because a very quick come. in american company and they demand illegally demand. information about such and such so it's only a government agency you can protect government agency but the government offers certain countries that's a problem so for us being russians is not fairly kaspersky co-founder of the spirit spotlight will be back should when you take a break. you know sometimes you see a story and it seems so for lengthly you think you understand it and then you
11:43 am
glimpse something else and you hear or see some other part of it and realize that everything you thought you knew you don't know i'm tom harpur welcome to the big picture. me it is easy to be easy if. you. please. click.
11:44 am
11:45 am
welcome back to spotlight i'm just a reminder that we're guest on the show today is that talia kaspersky the co-founder of kaspersky lab an expert in computer computer and knowledge is literally and we just we just started talking about how people be safe not safe when using their mobile devices he just said that that the f.b.i. for example can contact the. headquarters of big corporations and ask them to to disclose all the hides so they do from ation so if you are an american president or an american official you can feel relatively secure because because your government agency can control your security what about the russians as we know as we see it on television more than half of the russian high ranking
11:46 am
official including prime minister may well if they use those are gadgets i phones i pads all the time even even when. they work so does that mean that some of the information personal from mission can be disclosed and can be available for the biharis or so the russian the russian business and political elite is pretty transparent for the for the americans should they worry about. well. that information on the external on the rim or device you know exchanging it to have an edge and physically on this device i hope that the president was smart enough not to use the present of which were victims. rather than security is bought for him something in an ordinary store but to regularly say his location and some other stuff i don't think it would work differently
11:47 am
than process unless something there was not physically. that wasn't what. is it a need for example for you as a person who does business in this field for example to start working on securing personal information. gadgets for my current company and doesn't work with personnel but do you think there should be it will be a nationwide debate in the it might be an issue if. there is a technical solution possible because in some cases there is not possibility to protect that information completely it still needs to be investigated and secondly for the cost platforms like apple i don't saying it will be easy to upload such a function on it on the stock little you know there's so much ado about these
11:48 am
gadget bad information shared by gadgets but people are pretty curious today and themselves i mean most most of the kids especially there they're all social networks they share their information pictures whatever addresses phone numbers i mean i did them bruce and so what your family suffered because of that as far as i know i mean i mean your kid was kidnapped and then all started with social networking and the unknown not really they used other sources. by locking him in but. but you're absolutely right about the prison badger search social networks unfortunately in our sometimes i think how poor our children are because they are pull all what they have a. video for example on themselves. i mean it understand that internet is the one big rating machine which takes everything and never
11:49 am
forgets so if you once upon a time applaud that something then it stays in internet forever and if twenty years . thank you become or want to be watered as a president than you with particular picture will be hurts interesting listen i know that when you register in the social network you can stay there for a while if you want to quit the function so say i want to kill my page and kill all the information so what you say means that it doesn't really die now doesn't that of course it stays something where it may not be available to a little while but somebody can find it absolutely yes but really that's so in the internet it's like a person's brain i mean everything stays there and you should only be be qualified enough to to find online it really is a true yes who that's why you need to be careful enough evoke a spirit a skill that talia perske son was abducted but quickly released in april two
11:50 am
thousand and eleven let's hear more of the story in a report from spotlight. the april two thousand and eleven edition of the russian corpse magazine put the antivirus software model he gave you a spare ski and a list of the country's two hundred wealthiest people shortly afterwards the businessman son of man disappears he was abducted the kidnappers demanded three million euro ransom for his release they reportedly getting the necessary information about the younger kaspersky from the internet among other things they found out he had no bodyguards it was snatched not far from his work in one of moscow's industrial parks and was kept by his abductors in the suburban house the rescue operation carried out by the federal security service and the police was quick and bloodless after the kidnappers phone call was traced a group of five people was eventually detained in august this year the organizer of the kidnapping was sentenced to cool and
11:51 am
a half years in prison. what should i teach myself what should my award is teach their kids. what kind of world well. thanks should we teach them in order well at least to be. somehow secure is there something of the kids should never never share with you today. certainly don't give enough of personal information like home address who likes where you are now there is a function for example i am somewhere. it's. a good good thing for the robbery to start when you announce that you're now out of house for two weeks. then. stay with or make friendship was on the people whom you're known personally and not everybody or someone friend you know
11:52 am
some stranger you who you know you're not so in other words. and well don't give too much information i think just you know. i think what you do you know the problem was social network somehow people are more fun than they would be in the real world this is i think like more undress i think this is why they need them because people want to be open but they afraid to be open to strangers so they use it as you know as a priest i made to feel that that's a problem yes that's a problem and so they become you would not have undress if you stay in a room full of people but you would and the rest in the internet which is very strange you know for me because it's like you have a very big audience a looking at you at the very moment and that's something which unfortunately children don't understand will give you date i mean you really should people give the real world there in them so i don't see any problems with their real names plus
11:53 am
if you really want to it is very easy but well not very easy but it's somehow easy to find out who the person is again and. annie must in the internet is not really the case i know not tell you that you are one of those experts that are being used by by the russian government when the when the think about cyber security and stuff there's been reports that some cyber security strategy is being negotiated in the russian parliament separate chambre and you might be about the strategy developers who all advisors yes. could actually ask yeah i ask yeah well they did. they did in the past so what's it all about insults this security isn't something lying like the chinese know. well there is a discussion thread now there are many discussion sexually on different platforms about cyber security and about information security as such because it is your
11:54 am
probably not russia has the cream of security which was conducted back and two thousand and one and which is already out of date it is eleven years for information technology is very long. and now when you talk abt think that somehow operate i don't know but i haven't seen a real steps forward discussions around the topic. since i moved in china is great firewall of china it's being is being criticized sharply by the human rights activists but it's praised by government officials because it's really something that the chinese built. do you personally think as a brother foreign by the way that that the this freedom of the spread of information should be somehow controlled i'm absolutely certain and a lot of the bio more but also technologically. both both because you
11:55 am
cannot control technology on the by law it is impossible. and even controlled technologies by technologies but using the low fall. services or lawful . rules if you wish. because we see big big problems and children being kidnapped or being involved in bad networks such as drug distribution or even if you did the philly or whatever so our children that don't do much do it in the internet and i'm certain that children must be somehow protected some very much for this limitation . some of the activist of the human rights says it will potentially block the freedom of speech but. if we do not
11:56 am
do anything we would not have any protection would just stay in this door which is raising up every day and we simply need to clean it up somehow. therefore i'm certain they believe that by the way in the countries in europe and in america as well there are certain laws which protect. children against the. potential dangers information on the internet thank you thank you very much for being with us and just a reminder that my guests of the show today i was in the tahrir square scheme you co-founder and you are in that country to actually stop the bad suit from the help from all of us here if you have your sense spotlights just drop we'll. be back you know there's been a problem for what's going on in and outside russia so that they you are seen to.
11:57 am
wealthy british style. markets why not. find out what's really happening to the global economy with max cause or for a no holds barred look at the global financial headlines tune into kinds a report. and download the official location. choose your language stream quality and enjoy your
11:58 am
favorites. t.v. is now required to watch all its heat all you need is your mobile device to watch aussie any time of. the mission free cretaceous and free in-store charge is free. range humans the free is free studio time free. old free broadcast plug in video for your media projects and free media oh don the hearty tom.
11:59 am

29 Views

info Stream Only

Uploaded by TV Archive on